Can traditional IT cut the cost of cybersecurity solutions?

Where is the line between traditional IT administration and cyber security operations?

Or is there a line at all?

Or is there a line at all?

Those who use administrative DNS data to analyze and mitigate anomalies are relevant to both IT management and IT security.

But straddling that boundary isn’t always easy. More often than not, DNS administrators are focused on maintaining the pace of their workflow and view security as a secondary priority.

It cuts the other way, too. IT security professionals tend to overlook DNS data as a purely administrative function with little relevance to countering threats.

Here at the DODIIS 2017 conference, we heard from General Darren McDew, Commander of US Transportation Command, who eloquently summarized his own struggles to reconcile day-to-day IT administration with cyber security.

“I viewed cyber through the lens of IT,” he said, shaking his head. In a competition for scarce resources, Transportation Command treated cyber security as an extension of IT administration costs rather than recognizing it as a core capability.

The same thing can be said about DNS at the enterprise level. So many large organizations view DNS as a cost center – part of the core infrastructure which keeps networks up and running. Nothing more.

This is cyber security through the lens of IT.

DNS and CyberSecurity

There is a better approach: move day-to-day DNS network administration tasks into the context of cyber security.

By realizing and leveraging the value of DNS data for anomaly detection, “patient zero” identification, and protection of internal network traffic, traditional barriers between traditional IT administrators and their cyber security colleagues can be broken down.

It’s a question of vision. General McDew recognized that cyber security viewed through the lens of IT undervalued the entire network enterprise. True transformation requires IT professionals to break through organizational silos to realize the security value of the tasks they perform every day.

We know this isn’t always a comfortable or easy process; but we agree the journey is worthwhile.


Published in:


An avatar of the author

BlueCat provides core services and solutions that help our customers and their teams deliver change-ready networks. With BlueCat, organizations can build reliable, secure, and agile mission-critical networks that can support transformation initiatives such as cloud adoption and automation. BlueCat’s growing portfolio includes services and solutions for automated and unified DDI management, network security, multicloud management, and network observability and health.

Related content

Three technical reasons to let go of legacy tools and unify your DDI

Learn with BlueCat how security by design, cloud integration, and API programmability offer three technical reasons to adopt Unified DDI.

Read more
A digital illustration of a tablet with server towers and cloud, displaying various icons related to data, technology, and artificial intelligence on a blue and pink background.

Combine BlueCat Integrity with LiveAction network observability for total awareness

Shift to proactive, intelligent network operations when you combine a DDI foundation with network performance monitoring solutions.

Read more
Micetro_ Hybrid Cloud Integration Blog

Micetro simplifies hybrid cloud DNS and IP address management

Learn how Micetro can help you simplify and streamline DNS and IP address management across hybrid and multicloud environments.

Read more
Three operational reasons to drop legacy tools and unify your DDI

Three operational reasons to drop legacy tools and unify your DDI

Learn with BlueCat how visibility and control, process automation, and infrastructure reliability offer three reasons to adopt Unified DDI.

Read more

Attending Cisco Live in San Diego?

See how you can accelerate network transformation using Intelligent NetOps.